ITF401_IP1 - Introducing Computer Forensics 1 Computer...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Introducing Computer Forensics 1 Computer Forensics Report Computer Forensics Report Dionne Jordan 5-2-2010 American InterContinental University
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introducing Computer Forensics 2 Abstract This is a look at computer forensic. We will give you an introduction, a description of computer forensics, an explanation of the typical professional role found in computer forensics, a discussion of the required hardware and software needed to perform a computer investigations and a summary to complete our discussion on computer forensics.
Background image of page 2
Introducing Computer Forensics 3 Computer Forensics Report According to the new Shorter Oxford English dictionary computer forensics is “the application of forensic science techniques to computer based material”. It’s basically the process of preserving, identifying, analyzing, and showing digital evidence which is accepted in a legal proceeding. In many cases computer forensic is more science than art and more art than science. (Solomon, Barrett, Broom, 2005). The word forensics means, “to bring to the court”. Computer forensics is also the critical analysis of a computer hard drive after a crime, because special software tool and procedures are needed to analyze different areas where the data is stored. This involves getting deleted data from a computer hard drive and information from the servers that was subpoenaed in court or takes by law enforcement (Solomon, Barrett, Broom, 2005). It’s important to practice computer forensic because it will ensure an overall survivability and integrity of the network infrastructure (US-CERT, 2008). Computer forensics can help your organization as a defense in depth approach to computer security and network. Understanding the technical and legal part of computer forensics will ensure that you capture major information if your network is in danger of a crime and this will help your company prosecute if the person or persons are caught. During forensic work
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

ITF401_IP1 - Introducing Computer Forensics 1 Computer...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online